The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dataprobe iboot Pdu
|
|
CPEs | cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dataprobe iboot Pdu
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-10-09T13:30:19.348Z
Reserved: 2023-06-15T06:48:44.547Z
Link: CVE-2023-3259

Updated: 2024-08-02T06:48:08.289Z

Status : Modified
Published: 2023-08-14T04:15:10.417
Modified: 2024-11-21T08:16:48.917
Link: CVE-2023-3259

No data.